UCF STIG Viewer Logo

BlackBerry Playbook OS (NEA mode) Security Technical Implementation Guide (STIG)


Overview

Date Finding Count (10)
2013-03-14 CAT I (High): 2 CAT II (Med): 0 CAT III (Low): 8
STIG Description
This document describes required technical IA controls for the Playbook when used in the Non-Enterprise Activated (NEA mode). NEA mode is when the device is not connected to the DoD network and does not process sensitive DoD data or email.

Available Profiles



Findings (MAC I - Mission Critial Sensitive)

Finding ID Severity Title
V-34012 High Multiple Adobe Products Code Signing Certificate Revocation
V-36792 High Multiple Vulnerabilities in Adobe Flash Player and AIR
V-25007 Low Smartphones must be configured to require a password/passcode for device unlock.
V-25016 Low The device minimum password/passcode length must be set.
V-24986 Low All non-core applications on mobile devices must be approved by the DAA or Command IT Configuration Control Board.
V-25010 Low The smartphone inactivity timeout must be set.
V-30418 Low Download of user owned data (music files, picture files, etc.) on mobile devices must be based on the Command’s Mobile Device Personal Use Policy.
V-30419 Low Connecting mobile devices to user social media web accounts (Facebook, Twitter, etc.) must be based on the Command’s Mobile Device Personal Use Policy.
V-30412 Low The installation of user owned applications on the mobile device must be based on the Command’s Mobile Device Personal Use Policy.
V-30417 Low The use of the mobile device to view and/or download personal email must be based on the Command’s Mobile Device Personal Use Policy.